Follow
Sylvan Clebsch
Sylvan Clebsch
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Deny capabilities for safe, fast actors
S Clebsch, S Drossopoulou, S Blessing, A McNeil
Proceedings of the 5th International Workshop on Programming Based on Actors …, 2015
1452015
CCF: A framework for building confidential verifiable replicated services
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019
822019
Fully concurrent garbage collection of actors on many-core machines
S Clebsch, S Drossopoulou
Proceedings of the 2013 ACM SIGPLAN international conference on Object …, 2013
452013
Toward confidential cloud computing
M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ...
Communications of the ACM 64 (6), 54-61, 2021
422021
Snmalloc: a message passing allocator
P Liétar, T Butler, S Clebsch, S Drossopoulou, J Franco, MJ Parkinson, ...
Proceedings of the 2019 ACM SIGPLAN International Symposium on Memory …, 2019
292019
Orca: GC and type system co-design for actor languages
S Clebsch, J Franco, S Drossopoulou, AM Yang, T Wrigstad, J Vitek
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
292017
{IA-CCF}: Individual accountability for permissioned ledgers
A Shamis, P Pietzuch, B Canakci, M Castro, C Fournet, E Ashton, ...
19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022
192022
Amp: Authentication of media via provenance
P England, HS Malvar, E Horvitz, JW Stokes, C Fournet, R Burke-Aguero, ...
Proceedings of the 12th ACM Multimedia Systems Conference, 108-121, 2021
172021
Multi-stakeholder media provenance management to counter synthetic media risks in news publishing
J Aythora, R Burke-Agüero, A Chamayou, S Clebsch, M Costa, ...
Proc. Intl. Broadcasting Convention (IBC) 1 (2), 8, 2020
172020
Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use
M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ...
Queue 19 (1), 49-76, 2021
132021
Tree topologies for causal message delivery
S Blessing, S Clebsch, S Drossopoulou
Proceedings of the 7th ACM SIGPLAN International Workshop on Programming …, 2017
132017
'Pony': co-designing a type system and a runtime
S Clebsch
Imperial College London, 2017
122017
Ownership and reference counting based garbage collection in the actor world
S Clebsch, S Blessing, J Franco, S Drossopoulou
ICOOOLPS’2015, 2015
112015
Reference capabilities for flexible memory management
E Arvidsson, E Castegren, S Clebsch, S Drossopoulou, J Noble, ...
Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1363-1393, 2023
92023
The pony programming language. The Pony Developers
S Clebsch
The Pony Developers 1, 2015
82015
Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability
H Howard, F Alder, E Ashton, A Chamayou, S Clebsch, M Costa, ...
arXiv preprint arXiv:2310.11559, 2023
72023
Efficient transmission of data to multiple network nodes
AM Lovell, S Clebsch, G Cockroft
US Patent 6,633,570, 2003
72003
Roy Schuster, Alex Shamis, Olga Vrousgou, and Christoph M Wintersteiger.[nd]
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
CCF: A Framework for Building Confidential Verifiable Replicated Services …, 0
7
PAC: Practical accountability for CCF
A Shamis, P Pietzuch, M Castro, E Ashton, A Chamayou, S Clebsch, ...
arXiv preprint arXiv:2105.13116, 2021
62021
Package processing
SW Clebsch, MMJ Brockschmidt, SS Ishtiaq, JEC Alglave, MJ Parkinson, ...
US Patent 10,592,661, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20